Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
First Claim
1. A computer-implemented data processing method for analyzing data transfers, the method comprising:
- accessing, by one or more computer processors, a data transfer log entry representing a data transfer between a particular data asset and a second system, the data transfer log entry comprising a network address for the particular data asset and a network address for the second system;
determining, by one or more computer processors, an identity of the particular data asset based at least in part on the network address for the particular data asset;
determining, by one or more computer processors, a geographical location of the second system based at least in part on the network address for the second system;
accessing, by one or more computer processors based at least in part on the identity of the particular data asset, a data map associated with the particular data asset;
determining, by one or more computer processors based at least in part on the data map, a plurality of authorized geographical locations associated with the particular data asset;
comparing, by one or more computer processors, the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset;
determining, by one or more computer processors based at least in part on the comparison of the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset, that the geographical location of the second system is an unauthorized geographical location by determining that the geographical location of the second system is not among the plurality of authorized geographical locations associated with the particular data asset;
at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, generating, by one or more computer processors, a notification comprising an indication that the geographical location of the second system is an unauthorized geographical location, wherein;
the data transfer between the particular data asset and the second system has not yet been completed; and
the method further comprises, at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, taking one or more actions to stop the data transfer between the particular data asset and the second system before the data transfer has been completed.
2 Assignments
0 Petitions
Accused Products
Abstract
In particular embodiments, a Cross-Border Visualization Generation System is configured to: (1) identify one or more data assets associated with a particular entity; (2) analyze the one or more data assets to identify one or more data elements stored in the identified one or more data assets; (3) define a plurality of physical locations and identify, for each of the identified one or more data assets, a respective particular physical location of the plurality of physical locations; (4) analyze the identified one or more data elements to determine one or more data transfers between the one or more data systems in different particular physical locations; (5) determine one or more regulations that relate to the one or more data transfers; and (6) generate a visual representation of the one or more data transfers based at least in part on the one or more regulations.
934 Citations
19 Claims
-
1. A computer-implemented data processing method for analyzing data transfers, the method comprising:
-
accessing, by one or more computer processors, a data transfer log entry representing a data transfer between a particular data asset and a second system, the data transfer log entry comprising a network address for the particular data asset and a network address for the second system; determining, by one or more computer processors, an identity of the particular data asset based at least in part on the network address for the particular data asset; determining, by one or more computer processors, a geographical location of the second system based at least in part on the network address for the second system; accessing, by one or more computer processors based at least in part on the identity of the particular data asset, a data map associated with the particular data asset; determining, by one or more computer processors based at least in part on the data map, a plurality of authorized geographical locations associated with the particular data asset; comparing, by one or more computer processors, the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset; determining, by one or more computer processors based at least in part on the comparison of the geographical location of the second system to the plurality of authorized geographical locations associated with the particular data asset, that the geographical location of the second system is an unauthorized geographical location by determining that the geographical location of the second system is not among the plurality of authorized geographical locations associated with the particular data asset; at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, generating, by one or more computer processors, a notification comprising an indication that the geographical location of the second system is an unauthorized geographical location, wherein; the data transfer between the particular data asset and the second system has not yet been completed; and the method further comprises, at least partially in response to determining that the geographical location of the second system is an unauthorized geographical location, taking one or more actions to stop the data transfer between the particular data asset and the second system before the data transfer has been completed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer-readable medium storing computer-executable instructions for:
-
receiving, at one or more computer processors, a data transfer log entry representing a data transfer between a first system and a second system, the data transfer log entry comprising a network address for the first system and a network address for the second system; determining, by one or more computer processors based at least in part on the network address for the first system, that the first system is a data asset associated with a particular entity; determining, by one or more computer processors based at least in part on the network address for the first system, a data asset identifier for the first system; determining, by one or more computer processors based at least in part on the network address for the second system, that the second system is not associated with the particular entity; determining, by one or more computer processors based at least in part on the data asset identifier for the first system, a data map associated with the first system; accessing, by one or more computer processors, the data map associated with the first system; analyzing, by one or more computer processors, the data map to determine whether the second system is authorized to perform data transfers with the first system; determining, by one or more computer processors based at least in part on the analysis of the data map, that the second system is not authorized to perform data transfers with the first system; at least partially in response to determining that that the second system is not authorized to perform data transfers with the first system, taking, by one or more computer processors, one or more actions, wherein; the data transfer between the first system and the second system has not yet been completed; and the one or more actions comprise one or more actions to stop the data transfer between the first system and the second system before the data transfer has been completed. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A data transfer analysis data processing system comprising:
-
one or more computer processors; computer memory; and a non-transitory computer-readable medium storing computer-executable instructions that, when executed by the one or more computer processors, cause the one or more computer processors to perform operations comprising; detecting, at the one or more computer processors, an initiation of a data transfer between a data asset and a second system by detecting a generation of a data transfer log entry indicating the data transfer between the data asset and the second system, the data transfer log entry comprising an identifier of the data asset and a network address for the second system; determining, by the one or more computer processors based at least in part on the network address for the second system, a geographical location for the second system; determining, by the one or more computer processors based at least in part on the identifier of the data asset, a data map associated with the data asset; analyzing, by the one or more computer processors, the data map to determine whether the geographical location for the second system is among a plurality of geographical locations indicated in the data map associated with the data asset; determining, by the one or more computer processors based at least in part on the analysis of the data map, that the second system is not authorized to perform data transfers with the data asset; at least partially in response to determining that that the second system is not authorized to perform data transfers with the data asset, terminating, by the one or more computer processors, the data transfer between the data asset and the second system; and at least partially in response to determining that that the second system is not authorized to perform data transfers with the data asset, generating, by the one or more computer processors, a notification that the data transfer between the data asset and the second system has been terminated. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A data processing system for identifying potential transfers of data, the system comprising:
-
data transfer log entry reception means for receiving a data transfer log entry representing a data transfer between a first system and a second system, the data transfer log entry comprising a network address for the first system and a network address for the second system; data asset determination means for determining, based at least in part on the network address for the first system, that the first system is a data asset associated with a particular entity; data asset identification determination means for determining, based at least in part on the network address for the first system, a data asset identifier for the first system; the data asset determination means for determining, based at least in part on the network address for the second system, that the second system is not associated with the particular entity; data map acquisition means for determining, based at least in part on the data asset identifier for the first system, a data map associated with the first system; data map access means for accessing the data map associated with the first system; data map analysis means for analyzing the data map to determine whether the second system is authorized to perform data transfers with the first system; data transfer authorization means for determining, based at least in part on the analysis of the data map, that the second system is not authorized to perform data transfers with the first system; and unauthorized data transfer response means for, at least partially in response to determining that that the second system is not authorized to perform data transfers with the first system, taking one or more actions, wherein; the data transfer between the first system and the second system has not yet been completed; and the one or more actions comprise one or more actions to stop the data transfer between the first system and the second system before the data transfer has been completed.
-
Specification